Windows Server Members Still Authenticate with BDCs After PDC Is Upgraded (309273)
The information in this article applies to:
- Microsoft Windows Server 2003, Enterprise Edition
- Microsoft Windows Server 2003, Datacenter Edition
- Microsoft Windows Server 2003, Standard Edition
- Microsoft Windows XP Professional
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows Small Business Server 2003, Premium Edition
- Microsoft Windows Small Business Server 2003, Standard Edition
This article was previously published under Q309273 SYMPTOMS In a Microsoft Windows NT 4.0 domain that includes Windows
Server or Windows XP-based member
computers, when you upgrade the Primary Domain Controller (PDC) to Windows
Server, you may experience the
following symptoms:
- The Windows
Server or Windows XP-based member
computers may continue to use a Windows NT 4.0 Backup Domain Controller (BDC)
for authentication.
- In Windows
Server, specific
attributes on the computer account (dNSHostName and servicePrincipalName) may
be missing.
- When you log on to the workstations, "Directory" may be
missing under "Entire Network" in "My Network Places".
- In network traces from affected domain members, you may see
Kerberos errors on logon. This is because many computer accounts do not have
the servicePrincipalName attribute that is required to issue Kerberos tickets.
- Windows
Server members only apply downlevel
machine policies and not machine policies that are defined on sites, domains
and organizational units in Active Directory.
- The domain that the computer is joined to lists the NetBIOS name
of the domain instead of the fully qualified domain name (FQDN) when Windows
Server members have established encrypted channels to Windows
Server domain controllers in a mixed-mode, mixed-version domain.
CAUSE This behavior may occur because Windows
Server or Windows XP-based member
computers that are joined to a Windows NT 4.0 domain that is later upgraded to
Windows Server Active Directory do not actively
discover or establish encrypted channels with Windows
Server domain controllers. Because of
this, Active Directory features such as Kerberos authentication, Active
Directory policies, and site-based domain controller discovery are not enabled.
The only certain way for a Windows
Server or Windows XP-based member
computer to learn that its domain contains Windows
Server domain controllers is for the
member computer to query the primary domain controller for the version of its
operating system. In a large domain, this operation could overload the PDC with session and authentication requests. To avoid this
overload scenario, Windows
Server-based or Windows XP-based member
computers continue to establish encrypted channels with existing downlevel domain
controllers until Windows
Server domain controllers are
"discovered".
In a network trace you can see that the client sends
logon requests to all domain controllers that are returned in the WINS 1C response and also
tries other means (such as broadcasts) to locate domain controllers. Both Windows NT 4.0 and
Windows
Server domain controllers may respond to the logon
request, but in the end the client will establish an encrypted channel and
authenticate with the domain controller that first responds. The user logon
authentication may later occur by using Kerberos with a Windows
Server domain controller.
Modification Type: | Major | Last Reviewed: | 10/10/2003 |
---|
Keywords: | kbnetwork kbprb KB309273 |
---|
|